• >
  • >
  • >
  • >
  • >

Case Studies.

Add Case Study

Our Case Study database tracks 18,927 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Download Excel
Filters
  • (98)
    • (50)
    • (45)
    • (29)
    • (3)
    • (1)
    • View all
  • (10)
    • (10)
    • (1)
  • (6)
    • (4)
    • (2)
    • (1)
  • (4)
    • (2)
    • (2)
  • (2)
    • (1)
    • (1)
  • View all 6 Technologies
  • (23)
  • (17)
  • (11)
  • (6)
  • (5)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 21 Industries
  • (87)
  • (15)
  • (7)
  • (6)
  • (5)
  • (4)
  • (3)
  • (1)
  • (1)
  • (1)
  • View all 10 Functional Areas
  • (95)
  • (9)
  • (5)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 20 Use Cases
  • (58)
  • (40)
  • (39)
  • (11)
  • (8)
  • (4)
  • (3)
  • View all 7 Services
  • (113)
Selected Filters
113 case studies
Sort by:
Metro Bank Enhances Security for Office 365 Apps with Forcepoint CASB - Forcepoint Industrial IoT Case Study
Metro Bank Enhances Security for Office 365 Apps with Forcepoint CASB
Metro Bank, the UK’s first new High Street bank in over 100 years, wanted to improve employee productivity by enabling off-network access to Office 365 and Yammer. However, they found the move too risky, even with Mobile Device Management (MDM) in place. The bank needed a solution that would enable them to fully leverage their investment in cloud applications without increasing the risk of company data and confidential information falling into the wrong hands. The Infrastructure Delivery Team’s goal was to provide full access to Office 365 for corporate-owned device users—on or off network—and to extend access to Yammer for personal device users as well. As a second phase, specific colleagues were to be given off-site access to the more-sensitive information within Dynamics CRM. Enhancing mobile endpoint management was another key requirement. Metro Bank wanted to limit off-network access to the corporate devices already managed by AirWatch MDM, and there was no straightforward way to enforce this policy with their existing tools.
Download PDF
Spanbild Case Study - Forcepoint Industrial IoT Case Study
Spanbild Case Study
Spanbild, a manufacturer of expertly designed, quality steel, timber and paneled temporary, permanent and relocatable buildings, was facing a significant issue with its email security system. The company's website generates a large volume of queries from prospects seeking information and quotes, which are automatically directed by the email server to the appropriate franchisee for follow-up. However, franchisees began to query Spanbild regarding missing prospect information. Upon investigation, Spanbild’s IT team discovered that the company’s email security system was identifying a large number of false positives. Emails that should have been delivered were being categorized as spam and, therefore, filtered out. This included a large number of prospect inquiries. Additionally, they noticed that the email security software was running out of hard disk drive space.
Download PDF
Forcepoint Helps FinTech Company Stay Up and Running Safely - Forcepoint Industrial IoT Case Study
Forcepoint Helps FinTech Company Stay Up and Running Safely
The financial services technology organization faced the challenge of protecting sensitive customer data and end users while delivering constant access to the network to maximize employee productivity. The company needed to maintain a balance between giving employees enough control to do their jobs while keeping the network running and secure. The risk of network downtime, which would cost the company significant funds and productivity, was a significant concern.
Download PDF
Cobweb Enhances Network Security with Forcepoint NGFW - Forcepoint Industrial IoT Case Study
Cobweb Enhances Network Security with Forcepoint NGFW
Cobweb provides hosted services for over 150,000 mailboxes, managing firewalls for hundreds of locations with complex, overlapping IP schemas. The impact of overlapping schemas to Cobweb and its customers created an inability to deliver the service to customers. Furthermore, Cobweb has to ensure that the environment is up-to-date in order to manage a continually evolving threat landscape. Visits to perform data center upgrades in Segensworth, Fareham, and one in Telehouse, London were proving to be time intensive, and the company needed a system it could rely on to upgrade automatically.
Download PDF
Hospital Immunizes Against Data Breaches While Improving Patient Care - Forcepoint Industrial IoT Case Study
Hospital Immunizes Against Data Breaches While Improving Patient Care
The hospital was facing a challenge of protecting its sensitive data from human-based vulnerabilities, especially from social engineering attempts. The hospital's employees, dedicated to serving their patients, could be exploited by hackers seeking financial gain. The sensitive information stored by the hospital, such as patient personal data, physician credentials, and Drug Enforcement Agency license numbers, could be used by hackers to create fake identities, pose as a medical professional online, or even file fraudulent insurance claims. The hospital needed a cybersecurity solution that could address human vulnerability without impacting the ability to provide care for its patients.
Download PDF
Anoka County Government Data Protection Case Study - Forcepoint Industrial IoT Case Study
Anoka County Government Data Protection Case Study
Anoka County government in Minnesota's Twin Cities region is a rapidly growing county with over 22 departments and 3,300 users providing services to more than 320,000 citizens. The Information Services department of Anoka County supports a wide range of departments and divisions within the county, including transportation, law enforcement, public works, and administration. Their responsibility is to ensure the smooth running of the county's information systems. However, the challenge lies in keeping the county’s information systems free of malware and protecting confidential government data, which is critical.
Download PDF
IMI Remosa Enhances Data Security with Forcepoint - Forcepoint Industrial IoT Case Study
IMI Remosa Enhances Data Security with Forcepoint
IMI Remosa, a leading manufacturer of control systems, faced a significant challenge in protecting its proprietary information. As the company continued to grow and innovate, the volume and accessibility of sensitive data increased, making the company increasingly vulnerable to data leakage and theft. The company's transition to a multinational organization accelerated the need for a security solution that could prevent data leakage and theft while ensuring safe and regular access to sensitive information. The IT organization was tasked with protecting the company's intellectual property and defining user roles and access privileges. To ensure the security and control the flow of sensitive information within the network, a security solution that provides both comprehensive Data Theft Prevention and detailed analytic reports was necessary.
Download PDF
Data is the New Oil, and This Enterprise Keeps its Competitive Edge by Protecting Both with Forcepoint - Forcepoint Industrial IoT Case Study
Data is the New Oil, and This Enterprise Keeps its Competitive Edge by Protecting Both with Forcepoint
The company, a Fortune U.S. 50 enterprise oil and gas company, was facing a significant challenge in securing its critical proprietary data from people-based vulnerabilities. The company's task force identified that the biggest risk was employees leaving the company, who could potentially exfiltrate proprietary information. The company was aware of data leaks but lacked the ability to understand if they were accidental or malicious. The company needed a solution that could provide irrefutable evidence in case of litigation and help them get ahead of potential leaks.
Download PDF
Global CRM Provider Cegedim Relies on Forcepoint NGFW - Forcepoint Industrial IoT Case Study
Global CRM Provider Cegedim Relies on Forcepoint NGFW
Cegedim, a global provider of technology and data services to healthcare, life sciences, and insurance companies, operates a powerful network with extremely high throughput. This required a firewall performance to match. The company needed to deploy a large number of core network firewalls with advanced clustering to protect the entire IT infrastructure from external or internal attacks. Furthermore, Cegedim has distributed branch sites across Europe, Asia, and Australia, which required comprehensive, centralized administration and policy management capabilities.
Download PDF
This UK Bank Partners with Forcepoint to Outsmart Relentless Fraudsters Without Affecting the Online Customer Experience - Forcepoint Industrial IoT Case Study
This UK Bank Partners with Forcepoint to Outsmart Relentless Fraudsters Without Affecting the Online Customer Experience
The bank was facing a significant challenge in safeguarding its customers and itself against constantly changing, costly attacks on their online banking application. Fraudsters were always changing their tactics, and the bank's application, which required constant stability, couldn't react quickly enough to these changes. This left the bank vulnerable to the latest methods of fraud. The bank needed a solution that could provide an extra layer of security without affecting the stability of its banking application.
Download PDF
Arapahoe House Secures BYOD - Forcepoint Industrial IoT Case Study
Arapahoe House Secures BYOD
Arapahoe House, a leading provider of substance use disorder treatment in Colorado, faced a challenge with managing and securing data on mobile devices used by its distributed workforce. A significant portion of the workforce used their own devices to access corporate mail from the organization's hybrid Office 365 / Exchange deployment. The IT team was uncertain about the number of BYO devices in use and how they were being used. They needed a solution to secure the data on these mobile devices. They evaluated several MDM solutions including Airwatch and MobileIron but found them unsatisfactory due to their difficult deployment processes and poor user experiences.
Download PDF
Bay Cove deploys Bitglass Next-Gen CASB - Forcepoint Industrial IoT Case Study
Bay Cove deploys Bitglass Next-Gen CASB
Bay Cove Human Services, a healthcare provider network, was seeking a solution to ensure HIPAA compliance without altering the user experience. They were using Google's G Suite as their productivity backbone and needed a solution that would provide secure access to G Suite from any device. The challenge was to find a solution that would not require invasive agents or any configuration, and would allow users to simply log in to G Suite from any browser and be securely routed to the app.
Download PDF
Marisol enables secure BYOD with Next-Gen CASB - Forcepoint Industrial IoT Case Study
Marisol enables secure BYOD with Next-Gen CASB
Marisol International, a global supply chain services provider, faced a challenge in balancing the security requirements of global freight operations with the mobility needs of its employees. The company handles sensitive freight information for its customers, making security a top priority. However, its employees are globally dispersed and require access from a variety of BYOD (Bring Your Own Device) mobile devices. The company needed a solution that could be deployed quickly and easily, without taking undue control over personal mobile devices.
Download PDF
Financial Services Giant Secures Salesforce & Office 365 - Forcepoint Industrial IoT Case Study
Financial Services Giant Secures Salesforce & Office 365
The firm was looking for a cloud security solution that could be quickly deployed in concert with this rollout. Given the high profile nature of its clientele, the complete assurance of data privacy is of highest importance to the organization. The firm wanted to maintain sole control of its data – it didn’t feel comfortable with cloud vendors having any visibility into customer information. The firm’s security architecture and risk teams set out to find a security solution that would help enable secure cloud application usage. For Salesforce specifically, they wanted an encryption solution that maintained integrity of data security while enabling full application functionality including search, reporting, and the firm’s Salesforce customizations and third party integrations.
Download PDF
Fortune 100 Healthcare Firm Secures O365 with Next-Gen CASB - Forcepoint Industrial IoT Case Study
Fortune 100 Healthcare Firm Secures O365 with Next-Gen CASB
The healthcare firm was looking to transition its 30,000 global employees to a SaaS productivity suite. The firm’s IT team had already deployed Office 365 for email only, but without proper security controls it refused to deploy file sharing and storage via OneDrive and Sharepoint. The firm’s existing security architecture included next-gen firewall appliances, along with secure web gateways from Bluecoat and Symantec DLP appliances. This network-level security architecture was inadequate for protecting data in the cloud and allowing for access on any device. The firm’s internal Office 365 productivity suite initiative was set to rollout rapidly throughout the company, its enterprise security architecture team decided to deploy a cloud access security broker solution to enable secure cloud usage. Of particular concern was protecting PHI, PII, and corporate intellectual property in data flowing out of the cloud. The native Office 365 security controls did not provide an adequate level of data protection, especially in the case of data access by unmanaged and untrusted devices.
Download PDF
Payment Leader Achieves PCI Compliance with Next-Gen CASB - Forcepoint Industrial IoT Case Study
Payment Leader Achieves PCI Compliance with Next-Gen CASB
The payment and debit-card processing leader standardized on Google's G Suite, but struggled to achieve PCI compliance for its auditors. With a mix of regular employees and contractors, managed and BYOD mobiles and laptops, as well as a geographically distributed work force proved challenging when it came to achieving PCI compliance. The compliance team wanted to restrict contractors to browser access and only on the corporate network, whilst allowing regular employees full access on managed devices and corporate networks, but restricted access on BYOD.
Download PDF
Global Arms Giant Secures BYOD with Next-Gen CASB - Forcepoint Industrial IoT Case Study
Global Arms Giant Secures BYOD with Next-Gen CASB
The global arms manufacturer, based in the United States, faced a significant challenge in securing BYOD access to corporate productivity applications. The company, which supplies products to thousands of military and law-enforcement organizations worldwide, had previously attempted a Mobile Device Management (MDM) deployment. However, the MDM solution proved unsuitable for a wide range of BYOD devices. The global distribution of the company's employees made supporting MDM on BYOD very expensive. Moreover, many employees rejected the idea of installing MDM agents that controlled their devices and potentially threatened their privacy. This unsuccessful deployment of MDM resulted in lost productivity for the firm. The IT security team commenced a search for an agentless SaaS solution for mobile security.
Download PDF
Business Data Giant deploys Bitglass Next-Gen CASB - Forcepoint Industrial IoT Case Study
Business Data Giant deploys Bitglass Next-Gen CASB
The global business data giant, handling business and financial data for much of the Global 2000, faced a challenge when it chose Google's G Suite for SaaS productivity. The firm's existing network-centric security hardware was not capable of understanding the semantics of G Suite to enforce corporate data security policies. Furthermore, users expected access from any device, anywhere, rendering the firm's existing security hardware ineffective. The enterprise decided to use a Cloud Access Security Broker (CASB) to secure G Suite. However, three of the four vendors they considered could only support API-based visibility and control of corporate data, which was not sufficient for the firm's legal team.
Download PDF
Healthcare Leader Secures BYOD with Next-Gen CASB - Forcepoint Industrial IoT Case Study
Healthcare Leader Secures BYOD with Next-Gen CASB
The regional health insurance leader wanted to provide mobile email access to their employees while complying with HIPAA regulations. The challenge was to ensure that Protected Health Information (PHI) remained under the company's control at all times, as 75% of breaches in the healthcare sector are attributed to lost and stolen devices. The company's first attempt at solving the BYOD challenge involved device management software from Good Technology, which was quickly rejected by employees due to usability and privacy concerns.
Download PDF
Global Telecom Giant deploys Next-Gen CASB - Forcepoint Industrial IoT Case Study
Global Telecom Giant deploys Next-Gen CASB
The international telecom conglomerate was facing a pressing concern of data breaches despite having all the latest security gear. Their customers were finding breaches impossible to prevent and were looking to the telecom giant for help. The CTO and his team set out to evaluate the spectrum of early breach detection products on the marketplace. They first considered APT appliances, but quickly ruled them out as they could not scale to the high levels of traffic experienced by the firm’s clients. Next, the team considered various SIEM apps, but those required a huge amount of manual oversight from trained professionals to monitor the overwhelming number of alerts generated.
Download PDF
S&P 500 Beverage Maker Secures BYOD - Forcepoint Industrial IoT Case Study
S&P 500 Beverage Maker Secures BYOD
The S&P 500 beverage manufacturer was struggling to implement a secure Bring Your Own Device (BYOD) program for its globally distributed workforce. The company's IT team was concerned about the risk of corporate data being present on deprovisioned devices. Initial deployments of MobileIron and SAP Afaria, two mobile device management (MDM) solutions, proved challenging and were adopted by fewer than ten users. Employees were concerned about potential privacy violations with the installation of corporate security software on their personal mobile devices. The firm’s IT team found it impossible to install and configure MDM agents on thousands of devices, given the numerous variations of operating systems and device types that come with BYOD.
Download PDF
Drug Giant Discovers Data Breach - Forcepoint Industrial IoT Case Study
Drug Giant Discovers Data Breach
The global pharmaceutical giant, with over 20,000 employees, was facing a significant challenge in terms of its security posture. The newly appointed CISO wanted to evaluate the existing security infrastructure. Despite having a high-end firewall from a leading vendor, the company was still at risk. The Bitglass Breach Discovery Engine identified several high-risk Shadow IT cloud apps on the network. One unsanctioned cloud app was particularly concerning as it was used by employees to sync their contact lists and calendars. However, the most alarming discovery was the identification of three major risks: an internal IP in contact with a TOR node, twelve internal nodes in contact with a fake DNS server hosting phishing sites, and over thirty internal IPs contacting confirmed Malware hosts outside the firewall.
Download PDF
Freight Giant Uncovers Breach with Next-Gen CASB - Forcepoint Industrial IoT Case Study
Freight Giant Uncovers Breach with Next-Gen CASB
The multi-national transportation company was undergoing their annual audit when they decided to use Bitglass to catalog Shadow IT cloud apps on their network for their annual compliance report. The auditors uploaded two weeks of firewall logs, approximately 2M log lines per day, for Bitglass to analyze. The Bitglass Breach Discovery Engine identified four high-risk cloud apps widely used on the network: YouTube, MSN, Facebook, Dropbox, and Evernote. The company had previously blocked Gmail and Yahoo due to security concerns. These cloud apps were a compliance risk and merited mention in the annual audit. However, the Bitglass Breach Discovery Engine also uncovered a TOR (The Onion Router) node operating within the corporate network, which was a significant security concern.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that AGP may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from AGP.
Submit

Thank you for your message!
We will contact you soon.